首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   378篇
  免费   37篇
  国内免费   6篇
电工技术   3篇
化学工业   97篇
金属工艺   12篇
机械仪表   17篇
建筑科学   9篇
能源动力   35篇
轻工业   77篇
水利工程   1篇
石油天然气   4篇
无线电   36篇
一般工业技术   74篇
冶金工业   5篇
原子能技术   3篇
自动化技术   48篇
  2024年   1篇
  2023年   13篇
  2022年   25篇
  2021年   41篇
  2020年   43篇
  2019年   40篇
  2018年   37篇
  2017年   29篇
  2016年   24篇
  2015年   17篇
  2014年   16篇
  2013年   32篇
  2012年   13篇
  2011年   19篇
  2010年   17篇
  2009年   9篇
  2008年   4篇
  2007年   14篇
  2006年   2篇
  2005年   2篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1998年   2篇
  1997年   6篇
  1996年   2篇
  1994年   3篇
  1993年   1篇
  1990年   1篇
  1986年   1篇
  1985年   1篇
  1977年   1篇
  1969年   1篇
排序方式: 共有421条查询结果,搜索用时 15 毫秒
1.
Drongstrup  Dorte  Malik  Shafaq  Aljohani  Naif Radi  Alelyani  Salem  Safder  Iqra  Hassan  Saeed-Ul 《Scientometrics》2020,125(2):1541-1558
Scientometrics - Altmetrics are often praised as an alternative or complement to classic bibliometric metrics, especially in the social sciences discipline. However, empirical investigations of...  相似文献   
2.
3.
This paper investigates the design of fault-tolerant TDMA-based data aggregation scheduling (DAS) protocols for wireless sensor networks (WSNs). DAS is a fundamental pattern of communication in wireless sensor networks where sensor nodes aggregate and relay data to a sink node. However, any such DAS protocol needs to be cognisant of the fact that crash failures can occur. We make the following contributions: (i) we identify a necessary condition to solve the DAS problem, (ii) we introduce a strong and weak version of the DAS problem, (iii) we show several impossibility results due to the crash failures, (iv) we develop a modular local algorithm that solves stabilising weak DAS and (v) we show, through simulations and an actual deployment on a small testbed, how specific instantiations of parameters can lead to the algorithm achieving very efficient stabilisation.  相似文献   
4.
Infrared spectroscopy is suggested as a diagnostic method for the characterisation and qualitative estimation of the two classes of tannins. Gallic acid, tannic acid and chebulinic acid have been taken as model compounds for the hydrolysable and catechin for the condensed tannins. The former class is marked by the presence of strong absorption maxima at 1710 – 35 cm?1. The two classes have characteristic pattern of absorption, from which it is possible to characterise the particular type of tannin.  相似文献   
5.
Arshad  Madiha  Qureshi  Mahmood  Inam  Omair  Omer  Hammad 《Magma (New York, N.Y.)》2021,34(5):717-728
Magnetic Resonance Materials in Physics, Biology and Medicine - The success of parallel Magnetic Resonance Imaging algorithms like SENSitivity Encoding (SENSE) depends on an accurate estimation of...  相似文献   
6.

The edge computing model offers an ultimate platform to support scientific and real-time workflow-based applications over the edge of the network. However, scientific workflow scheduling and execution still facing challenges such as response time management and latency time. This leads to deal with the acquisition delay of servers, deployed at the edge of a network and reduces the overall completion time of workflow. Previous studies show that existing scheduling methods consider the static performance of the server and ignore the impact of resource acquisition delay when scheduling workflow tasks. Our proposed method presented a meta-heuristic algorithm to schedule the scientific workflow and minimize the overall completion time by properly managing the acquisition and transmission delays. We carry out extensive experiments and evaluations based on commercial clouds and various scientific workflow templates. The proposed method has approximately 7.7% better performance than the baseline algorithms, particularly in overall deadline constraint that gives a success rate.

  相似文献   
7.
Human Activity Recognition (HAR) is an active research area due to its applications in pervasive computing, human-computer interaction, artificial intelligence, health care, and social sciences. Moreover, dynamic environments and anthropometric differences between individuals make it harder to recognize actions. This study focused on human activity in video sequences acquired with an RGB camera because of its vast range of real-world applications. It uses two-stream ConvNet to extract spatial and temporal information and proposes a fine-tuned deep neural network. Moreover, the transfer learning paradigm is adopted to extract varied and fixed frames while reusing object identification information. Six state-of-the-art pre-trained models are exploited to find the best model for spatial feature extraction. For temporal sequence, this study uses dense optical flow following the two-stream ConvNet and Bidirectional Long Short Term Memory (BiLSTM) to capture long-term dependencies. Two state-of-the-art datasets, UCF101 and HMDB51, are used for evaluation purposes. In addition, seven state-of-the-art optimizers are used to fine-tune the proposed network parameters. Furthermore, this study utilizes an ensemble mechanism to aggregate spatial-temporal features using a four-stream Convolutional Neural Network (CNN), where two streams use RGB data. In contrast, the other uses optical flow images. Finally, the proposed ensemble approach using max hard voting outperforms state-of-the-art methods with 96.30% and 90.07% accuracies on the UCF101 and HMDB51 datasets.  相似文献   
8.
A substitution box (S-Box) is a crucial component of contemporary cryptosystems that provide data protection in block ciphers. At the moment, chaotic maps are being created and extensively used to generate these S-Boxes as a chaotic map assists in providing disorder and resistance to combat cryptanalytical attempts. In this paper, the construction of a dynamic S-Box using a cipher key is proposed using a novel chaotic map and an innovative tweaking approach. The projected chaotic map and the proposed tweak approach are presented for the first time and the use of parameters in their working makes both of these dynamic in nature. The tweak approach employs cubic polynomials while permuting the values of an initial S-Box to enhance its cryptographic fort. Values of the parameters are provided using the cipher key and a small variation in values of these parameters results in a completely different unique S-Box. Comparative analysis and exploration confirmed that the projected chaotic map exhibits a significant amount of chaotic complexity. The security assessment in terms of bijectivity, nonlinearity, bits independence, strict avalanche, linear approximation probability, and differential probability criteria are utilized to critically investigate the effectiveness of the proposed S-Box against several assaults. The proposed S-Box’s cryptographic performance is comparable to those of recently projected S-Boxes for its adaption in real-world security applications. The comparative scrutiny pacifies the genuine potential of the proposed S-Box in terms of its applicability for data security.  相似文献   
9.
Authentication and authorization for Grids is a challenging security issue. In this paper, key issues for the establishment of Grid authentication and authorization infrastructures are discussed, and an overview of major Grid authentication and authorization technologies is presented. Related to this, recent developments in Grid authentication and authorization infrastructures suggest adoption of the Shibboleth technology which offers advantages in terms of usability, confidentiality, scalability and manageability. When combined with advanced authorization technologies, Shibboleth-based authentication and authorization infrastructures provide role-based, fine-grained authorization. We share our experience in constructing a Shibboleth-based authentication and authorization infrastructure and believe that such infrastructure provides a promising solution for the security of many application domains.  相似文献   
10.
Pole-like structures (PLSs) located in road environment are important roadway assets. They play a vital role in road safety inspection and road planning. The use of light detection and ranging (lidar) based mobile mapping technology for mapping of PLSs is an important area of research as it holds the potential for automation. Point cloud data of rural, peri-urban, and urban road environment are used in this study, which pose special challenge in view of the complexity of terrain, unlike well-planned roads, which have been the subject of interest in existing literature for identification of PLSs. A new five-step method is proposed in this article. The first two steps, i.e. ground filtering and voxelization of filtered non-ground points, are used for data size reduction. Next three steps are used to extract PLSs from reduced data. The proposed method was tested on point cloud data of three test sites having different levels of complexities. PLSs including partially occluded pole, tilted pole, pole situated very close to other objects, and vertical pole attached to tilted pole were accurately identified. Average correctness and completeness, respectively of 92.6% and 94.9%, were achieved in three different complex test sites, i.e. urban, peri-urban, and rural sites, respectively. Computation complexity shows that our proposed method delivers fast and computationally efficient solution for identifying the PLSs from volumetric mobile lidar point cloud. Impact of PLSs on road safety and road planning is also addressed for these selected test sites.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号